Hi,
I''m running shorewall 1.4.2 on a debian system.
I got this problem that some of my wan ip''s doesn''t respond to
traffic.
Wan : 80.164.172.0/28 connected to eth0
Lan : 192.168.2.0/24 connected to eth1
On the lan I have to computers running exchange server, 192.168.2.1, and
terminal server, 192.168.2.2.
I would like to run ftp/smtp/www on one of the firewall''s
ip''s, 192.168.2.4
internet ---> FW eth0 : 80.164.172.0/28
eth1 :192.168.2.254 gateway for 192.168.2.0/24
| 192.168.2.3 used for misc services
| 192.168.2.4 used for webserver
|
switch--> 192.168.2.1 exchangeserver
|
+------> 192.168.2.2 terminal server
|
+------> 192.168.2.64/26 Workstations
The nat for 80.164.172.11+12 -> 192.168.2.1+2 works great. But not the one
for 80.164.172.14 -> 192.168.2.4.
in rules file :
#exchange server
ACCEPT all loc:192.168.2.1 tcp 25,80,110,143,3389
#termserver
ACCEPT all loc:192.168.2.2 tcp 3389
And now the trouble :
ACCEPT net fw:192.168.2.4 tcp
21,22,25,80,110,143,ftp-data
I can''t get any response from the rule.
The above rules for exchange and termserver are working just fine.
What am I doing wrong ?
I have tried loc:192.168.2.4 as well. No luck either.
Traffic from Lan to internet and firewall are ok.
Planned use of ip''s :
80.164.172.1 firewall''s ip
80.164.172.2 - 9 VPN usage. Later... Not now.
80.164.172.10 masq address for lan
80.164.172.11 exchange server - nat''ed to 192.168.2.1
80.164.172.12 terminal server - nat''ed to 192.168.2.2
80.164.172.13 testing of services
80.164.172.14 webserver - nat''ed to 192.168.2.4 (if it would work)
TIA.
Per Nielsen :-)
---- INFO -----
### shorewall version ###
ncc1701:~# shorewall version
1.4.2
### uname -a ###
uname -a
Linux ncc1701 2.4.18-bf2.4 #1 Son Apr 14 09:53:28 CEST 2002 i586 unknown unknown
GNU/Linux
### ip addr show ###
ncc1701:~# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:e0:7d:02:0c:15 brd ff:ff:ff:ff:ff:ff
inet 80.164.172.1/28 brd 80.164.172.15 scope global eth0
inet 80.164.172.11/28 brd 80.164.172.15 scope global secondary eth0
inet 80.164.172.12/28 brd 80.164.172.15 scope global secondary eth0
inet 80.164.172.14/28 brd 80.164.172.15 scope global secondary eth0
inet 80.164.172.10/28 brd 80.164.172.15 scope global secondary eth0:0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:e0:7d:02:0c:16 brd ff:ff:ff:ff:ff:ff
inet 192.168.2.254/24 brd 192.168.2.255 scope global eth1
inet 192.168.2.3/24 brd 192.168.2.255 scope global secondary eth1
inet 192.168.2.4/24 brd 192.168.2.255 scope global secondary eth1
### ip route show ###
ncc1701:~# ip route show
80.164.172.0/28 dev eth0 proto kernel scope link src 80.164.172.1
192.168.2.0/24 dev eth1 proto kernel scope link src 192.168.2.254
default via 62.242.27.189 dev eth0
default via 80.164.172.1 dev eth0 scope link
### lsmod ###
ncc1701:~# lsmod
Module Size Used by Not tainted
nls_cp437 4384 0 (autoclean)
ipt_TOS 1024 16 (autoclean)
ipt_LOG 3136 4 (autoclean)
ipt_REJECT 2816 6 (autoclean)
ipt_state 608 70 (autoclean)
iptable_mangle 2112 1 (autoclean)
ip_nat_irc 2304 0 (unused)
ip_nat_ftp 2912 0 (unused)
iptable_nat 12628 3 [ip_nat_irc ip_nat_ftp]
ip_conntrack_irc 2432 0 (unused)
ip_conntrack_ftp 3168 0 (unused)
ip_conntrack 12652 4 [ipt_state ip_nat_irc ip_nat_ftp iptable_nat
ip_conntrack_irc ip_conntrack_ftp]
iptable_filter 1728 1 (autoclean)
ip_tables 10432 9 [ipt_TOS ipt_LOG ipt_REJECT ipt_state
iptable_mangle iptable_nat iptable_filter]
keybdev 1664 0 (unused)
usbkbd 2848 0 (unused)
usbcore 48000 0 [usbkbd]
input 3040 0 [keybdev usbkbd]
### nat ###
#EXTERNAL INTERFACE INTERNAL ALL INTERFACES LOCAL
80.164.172.11 eth0 192.168.2.1 No No
80.164.172.12 eth0 192.168.2.2 No No
80.164.172.14 eth0 192.168.2.4 No No
### zone ###
net Net Internet
loc Local Local Networks
### interface ###
net eth0 80.164.172.15 routefilter,norfc1918
loc eth1 192.168.2.255
### masq ###
eth0:0 192.168.2.64/26 80.164.172.10
### rules ###
ACCEPT all net tcp 53
ACCEPT all net udp 53
ACCEPT all fw tcp 53
ACCEPT all fw udp 53
#
ACCEPT loc fw tcp 22
ACCEPT net fw tcp 22,80
#
# Traceroute
ACCEPT all fw udp 33434:33600
ACCEPT all loc:192.168.2.1 udp 33434:33600
ACCEPT all loc:192.168.2.4 udp 33434:33600
# NCC1701
ACCEPT net fw:192.168.2.4 tcp
21,22,25,80,110,143,ftp-data
# SERVER og TERMSERVER
ACCEPT all loc:192.168.2.1 tcp 25,80,110,143,3389
ACCEPT all loc:192.168.2.2 tcp 3389
<<status.txt>>
-------------- next part --------------
Shorewall-1.4.2 Status at ncc1701 - Wed May 14 08:54:54 CEST 2003
Counters reset Wed May 14 08:54:08 CEST 2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
62 3200 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
7 504 eth0_fwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0
11 568 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
38 2312 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain all2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain common (4 references)
pkts bytes target prot opt in out source destination
0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 reject-with icmp-port-unreachable
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:445 reject-with icmp-port-unreachable
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:139 reject-with icmp-port-unreachable
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:445 reject-with icmp-port-unreachable
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 state NEW
0 0 DROP all -- * * 0.0.0.0/0
80.164.172.15
0 0 DROP all -- * * 0.0.0.0/0
192.168.2.255
Chain dynamic (4 references)
pkts bytes target prot opt in out source destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source destination
7 504 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
7 504 net2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 net2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source destination
11 568 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
11 568 loc2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source destination
62 3200 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
62 3200 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
38 2312 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.1
state NEW udp dpts:33434:33600
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.4
state NEW udp dpts:33434:33600
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:143
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:3389
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.2
state NEW tcp dpt:3389
0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 fw2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
Chain loc2all (3 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
1 48 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
62 3200 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpts:33434:33600
0 0 loc2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2loc (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.1
state NEW udp dpts:33434:33600
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.4
state NEW udp dpts:33434:33600
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:143
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:3389
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.2
state NEW tcp dpt:3389
0 0 loc2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
10 520 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
1 48 loc2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:80
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpts:33434:33600
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:21
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:143
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.4
state NEW tcp dpt:20
0 0 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
7 504 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.1
state NEW udp dpts:33434:33600
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.4
state NEW udp dpts:33434:33600
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:143
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.1
state NEW tcp dpt:3389
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.2
state NEW tcp dpt:3389
0 0 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (11 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (5 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
NAT Table
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 eth0_out all -- * eth0 0.0.0.0/0 0.0.0.0/0
0 0 eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT all -- * * 0.0.0.0/0
80.164.172.11 to:192.168.2.1
0 0 DNAT all -- * * 0.0.0.0/0
80.164.172.12 to:192.168.2.2
0 0 DNAT all -- * * 0.0.0.0/0
80.164.172.14 to:192.168.2.4
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source destination
0 0 SNAT all -- * * 192.168.2.64/26 0.0.0.0/0
to:80.164.172.10
Chain eth0_out (1 references)
pkts bytes target prot opt in out source destination
0 0 SNAT all -- * * 192.168.2.1 0.0.0.0/0
to:80.164.172.11
0 0 SNAT all -- * * 192.168.2.2 0.0.0.0/0
to:80.164.172.12
0 0 SNAT all -- * * 192.168.2.4 0.0.0.0/0
to:80.164.172.14
Mangle Table
Chain PREROUTING (policy ACCEPT 81 packets, 4312 bytes)
pkts bytes target prot opt in out source destination
81 4312 pretos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 63 packets, 3240 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 18 packets, 1072 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 38 packets, 2312 bytes)
pkts bytes target prot opt in out source destination
38 2312 outtos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 56 packets, 3384 bytes)
pkts bytes target prot opt in out source destination
Chain outtos (1 references)
pkts bytes target prot opt in out source destination
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:110 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
38 2312 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source destination
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:110 TOS set 0x10
73 3760 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
7 504 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
tcp 6 431963 ESTABLISHED src=192.168.2.67 dst=217.157.136.52 sport=1217
dport=22 src=217.157.136.52 dst=80.164.172.10 sport=22 dport=1217 [ASSURED]
use=1
tcp 6 431999 ESTABLISHED src=192.168.2.67 dst=192.168.2.254 sport=1199
dport=22 src=192.168.2.254 dst=192.168.2.67 sport=22 dport=1199 [ASSURED] use=1
tcp 6 22 TIME_WAIT src=66.227.104.103 dst=80.164.172.10 sport=43307
dport=80 src=80.164.172.10 dst=66.227.104.103 sport=80 dport=43307 [ASSURED]
use=1
udp 17 47 src=192.168.2.1 dst=193.88.44.42 sport=1082 dport=53
src=193.88.44.42 dst=80.164.172.11 sport=53 dport=1082 [ASSURED] use=1
tcp 6 431699 ESTABLISHED src=192.168.2.67 dst=217.157.136.52 sport=1101
dport=143 src=217.157.136.52 dst=80.164.172.10 sport=143 dport=1101 [ASSURED]
use=1
tcp 6 424414 ESTABLISHED src=192.168.2.67 dst=217.157.136.52 sport=1914
dport=22 src=217.157.136.52 dst=80.164.172.10 sport=22 dport=1914 [ASSURED]
use=1
tcp 6 74 SYN_SENT src=192.168.2.1 dst=209.204.62.47 sport=2731 dport=25
[UNREPLIED] src=209.204.62.47 dst=80.164.172.11 sport=25 dport=2731 use=1
tcp 6 431700 ESTABLISHED src=192.168.2.67 dst=217.157.136.52 sport=1174
dport=143 src=217.157.136.52 dst=80.164.172.10 sport=143 dport=1174 [ASSURED]
use=1
tcp 6 431940 ESTABLISHED src=192.168.2.67 dst=62.243.74.162 sport=1417
dport=119 src=62.243.74.162 dst=80.164.172.10 sport=119 dport=1417 [ASSURED]
use=1
tcp 6 22 TIME_WAIT src=66.227.104.103 dst=80.164.172.10 sport=43308
dport=80 src=80.164.172.10 dst=66.227.104.103 sport=80 dport=43308 [ASSURED]
use=1